Research Article | OPEN ACCESS
Mutual-anonymity and Authentication Key Agreement Protocol
1Tao Feng, 1Chuang Zou, 2Chunyan Liu and 1Zheng Hao
1School of Computer and Communication
2School of Economics and Management, Lanzhou University of Technology, Lanzhou 730050, China
Research Journal of Information Technology 2013 3:81-86
Received: April 08, 2013 | Accepted: May 03, 2013 | Published: September 01, 2013
Abstract
According to the characteristics of trusted computation, we proposed an efficient pseudonym ring signature-based authentication and key agreement protocol with mutual anonymity. The use of ring signature can hide the identity information of communicating parties and effectively prevent the leakage of private information. Finally we derive a shared session key between them for their future secure communication especially in the trusted computation environment. Our protocol reaches the level of universally composable security and is more efficient.
Keywords:
Anonymity, authentication and key agreement, ring signature, trusted computation, universally composable,
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2041-3114
ISSN (Print): 2041-3106 |
|
Information |
|
|
|
Sales & Services |
|
|
|